scispace - formally typeset
Open Access

The Secure Sockets Layer (SSL) Protocol Version 3.0

Alan O. Freier, +2 more
- Vol. 6101, pp 1-67
Reads0
Chats0
TLDR
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract
This document specifies Version 3.0 of the Secure Sockets Layer (SSL V3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

read more

Citations
More filters

Prying open Pandora's box: KCI attacks against TLS

TL;DR: The insecure TLS options that enable KCI attacks should be immediately disabled in TLS clients and removed from future versions and implementations of the protocol: their utility is extremely limited, their raison d'etre is practically nil, and the existence of these insecure key agreement options only adds to the arsenal of attack vectors against cryptographically secured communication on the Internet.
Proceedings ArticleDOI

Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm

TL;DR: This paper will be focusing on the comparison of working procedure of elliptic curve cryptography and RSA algorithm in GSM network to how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in the Public-Key Cryptographic algorithms of RSA.
Patent

Cryptographic proxy service

TL;DR: In this article, the plurality of data associated with a network destination is encrypted according to the security certificate associated with the network destination and provided to the cryptographic service for re-encryption and transmission to the destination.
Proceedings ArticleDOI

Secure and Efficient Cloud Computing Framework

TL;DR: A cloud computing framework that classifies the data based on their importance so that more important data will be encrypted with more secure encryption algorithm and larger key sizes, while less important data might even not be encrypted.
Posted Content

Certificate Transparency Using Blockchain.

TL;DR: This paper proposes a novel system, called CTB, that makes it impossible for a CA to issue a certificate for a domain without obtaining consent from the domain owner, and makes progress to equip CTB with certificate revocation mechanism.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.

XDR: External Data Representation Standard

R. Srinivasan
TL;DR: This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted.